US8343236B2 - Anti-theft system and method for mobile phone - Google Patents
Anti-theft system and method for mobile phone Download PDFInfo
- Publication number
- US8343236B2 US8343236B2 US12/604,917 US60491709A US8343236B2 US 8343236 B2 US8343236 B2 US 8343236B2 US 60491709 A US60491709 A US 60491709A US 8343236 B2 US8343236 B2 US 8343236B2
- Authority
- US
- United States
- Prior art keywords
- mobile phone
- user information
- card
- cryptographic keys
- sim card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
Definitions
- the present disclosure relates to an anti-theft system and method for mobile phone.
- FIG. 1 is a block diagram of a real-name card-issuing system and a SIM card, according to an exemplary embodiment.
- FIG. 2 is a block diagram of a mobile phone and the SIM card shown in FIG. 1 , according to the exemplary embodiment.
- FIG. 3 is a block diagram of the mobile phone and an examination smart card shown in FIGS. 1-2 .
- FIG. 4 is a block diagram of the mobile phone and an initialization smart card shown in FIGS. 1-2 .
- FIG. 5 is a flow chart of the first cryptographic keys setting and verification between the SIM card and the real-name card-issuing system shown in FIG. 1 .
- FIG. 6 is a flow chart of the second cryptographic keys setting and verification between the SIM card and the mobile phone shown in FIG. 2 .
- FIG. 7 is a flow chart of initialization of the mobile phone shown in FIG. 2 .
- FIG. 1 and FIG. 2 show a mobile phone anti-theft system according to an exemplary embodiment.
- the mobile phone anti-theft system includes a real-name card-issuing system 10 , a mobile phone 20 and a SIM card 30 .
- the real-name card-issuing system 10 is the information management system of the communication operators, i.e., wireless carriers.
- the real-name card-issuing system 10 includes a central processing unit 100 , a first user information storage area 102 , transmission equipment 104 , an examination smart card 106 , an initialization smart card 108 and a card reader 110 .
- the first user information storage area 102 , the central processing unit 100 , the transmission equipment 104 and the card reader 110 are electronically connected together.
- the examination smart card 106 , the initialization smart card 108 and the SIM card 30 can communicate with the central processing unit 100 through the card reader 110 and the transmission equipment 104 .
- the transmission equipment 104 reads the information from the card connected to the card reader 110 and sends the information to the central processing unit 100 .
- the card reader 110 should be only connected to one card at a time.
- the examination smart card 106 includes a first processor 1061 and a first storage area 1063 .
- the initialization smart card 108 includes a second processor 1081 and a second storage area 1083 .
- the SIM card 30 includes a third processor 32 and a third storage area 34 .
- the third storage area 34 stores user information, first cryptographic keys and second cryptographic keys.
- the mobile phone 20 includes a micro control unit 21 , a second user information storage area 23 and a transmission unit 25 .
- the second user information storage area 23 , the micro control unit 21 and the transmission unit 25 are electronically connected together.
- the transmission unit 25 reads the information from the card inserted into the mobile phone 20 and sends the information to the micro control unit 21 .
- the SIM card 30 , the examination smart card 106 , and the initialization smart card 108 can communicate with the micro control unit 21 through the transmission unit 25 .
- the examination smart card 106 and the initialization smart card 108 are owned by the communication operators, so when the examination smart card 106 or the initialization smart card 108 is inserted into the mobile phone 20 , the mobile phone 20 can be operated normally without verifying the cryptographic keys. When the SIM card 30 is inserted into the mobile phone 20 , the second cryptographic keys should be verified before using the mobile phone 20 .
- the first processor 1061 and the second processor 1081 can communicate with the micro control unit 21 through the transmission unit 25 .
- the SIM card 30 should be registered in the real-name card-issuing system 10 before the initial use. If the user information of the SIM card 30 needs to be changed, first, the real-name card-issuing system 10 should verify the first cryptographic keys of the SIM card 30 .
- the processes of the registering and making changes in the user information of the SIM card 30 may include the following steps:
- step S 1 the user information such as user name, sex, ID number, address and so on are inputted into the real-name card-issuing system 10 and saved in the first user information storage area 102 .
- step S 2 the SIM card 30 is electronically connected to the card reader 110 , the card reader 110 reads the information of the SIM card 30 and sends the information to the central processing unit 100 .
- the central processing unit 100 judges whether the SIM card 30 is new. If the SIM card 30 is new, the process goes to step S 3 , where the real-name card-issuing system 10 sends the user information inputted in step S 1 to the SIM card 30 . If the SIM card 30 is not new, the process goes to step S 6 , where the real-name card-issuing system 10 sends the user information inputted in the step S 1 and the first cryptographic keys stored in the first user information storage area 102 to the SIM card 30 .
- step S 4 the third processor 32 receives the user information and saves it in the third storage area 34 .
- the third processor 32 randomly generates initial keys and sends them to the real-name card-issuing system 10 .
- step S 5 the real-name card-issuing system 10 receives the initial keys as the first cryptographic keys and saves the initial cryptographic keys to the first user information storage area 102 .
- the registration of the SIM card 30 is completed.
- step S 7 the SIM card 30 receives the user information and the first cryptographic keys.
- step S 8 the SIM card 30 judges whether the first cryptographic keys are validated. If the first cryptographic keys are validated, the process goes to step S 9 , where the SIM card 30 updates the user information and sends random cryptographic keys to the real-name card-issuing system 10 . If the first cryptographic keys are not validated, the process goes to step S 11 , where the SIM card 30 sends update failure message to the real-name card-issuing system 10 . Thus, the SIM card 30 can not be used.
- step S 10 the real-name card-issuing system 10 receives the random cryptographic keys and saves the random cryptographic keys to the first user information storage area 102 .
- the user information is updated and the first cryptographic keys verification between the real-name card-issuing system 10 and the SIM card 30 is completed.
- the SIM card 30 should have registered in the real-name card-issuing system 10 before being used in the mobile phone 20 .
- the mobile phone 20 verifies the second cryptographic keys of the SIM card 30 .
- the processes of the second cryptographic keys setting and verification between the SIM card 30 and the mobile phone 20 may include the following steps:
- step S 12 the SIM card 30 is inserted into the mobile phone 20 and the mobile phone 20 is turned on.
- step S 13 the third processor 32 judges whether the mobile phone 20 is new. If the mobile phone 20 is new, the process goes to step S 14 , where the third processor 32 sends the user information to the micro control unit 21 . If the mobile phone 20 is not new, the process goes to step S 17 , where the third processor 32 sends the user information and the second cryptographic keys to the micro control unit 21 .
- step S 15 the micro control unit 21 receives the user information and saves it to the second user information storage area 23 .
- the micro control unit 21 randomly generates cryptographic keys and sends them to the third processor 32 .
- step S 16 the third processor 32 receives the random cryptographic keys as the second cryptographic keys and saves the random cryptographic keys to the third storage area 34 .
- the second cryptographic keys setting between the SIM card 30 and the mobile phone 20 is completed.
- step S 18 the micro control unit 21 receives the user information and the second cryptographic keys and judges whether the second cryptographic keys are validated. If the second cryptographic keys are not validated, the process goes to step S 19 , where the mobile phone 20 is locked. If the second cryptographic keys are validated, the process goes to step S 20 , where the micro control unit 21 judges whether the user information is changed according to the user information comparison between the second user information storage area 23 and the third storage area 34 .
- step S 20 if the user information is changed, the process goes to step S 21 , where the micro control unit 21 updates the user information and sends random cryptographic keys to the SIM card 30 . If the user information is not changed, the process goes to step S 23 , where the micro control unit 21 randomly generates cryptographic keys and sends them to the third processor 32 .
- step S 22 the third processor 32 receives the random cryptographic keys and saves the random cryptographic keys to the third storage area 34 .
- the user information update and the second cryptographic keys verification between the SIM card 30 and the mobile phone 20 is completed.
- step S 24 the SIM card 30 receives the random cryptographic keys of the step S 23 and saves the random cryptographic keys to the third storage area 34 .
- the second cryptographic keys verification between the SIM card 30 and the mobile phone 20 is completed.
- the process of the mobile phone initialization may include the following steps:
- step S 25 the examination smart card 106 is inserted into the mobile phone 20 and the mobile phone 20 is turned on.
- step S 26 the first processor 1061 sends instructions of reading the user information to the micro control unit 21 .
- step S 27 the micro control unit 21 receives the instructions of reading the user information and sends the user information of the second user information storage area 23 to the first processor 1061 .
- the first processor 1061 receives the user information and saves it to the first storage area 1063 .
- step S 28 the examination smart card 106 is taken out of the mobile phone 20 and connected to the card reader 110 .
- step S 29 the central processing unit 100 reads the user information from the examination smart card 106 and judges whether there is a need for initializing the mobile phone 20 according to the effective ID of the user, i.e., valid ID card. If the effective ID of the user corresponds with the user information stored in the examination smart card 106 , the process goes to step S 30 , where the initialization smart card 108 is inserted into the mobile phone 20 and the mobile phone 20 is turned on. If the effective ID of the user does not correspond with the user information stored in the examination smart card 106 , the process goes to step S 19 , where the mobile phone 20 is locked.
- the effective ID of the user i.e., valid ID card.
- step S 31 the second processor 1081 of the initialization smart card 108 sends the initialization commands to the micro control unit 21 .
- step S 32 the mobile phone 20 is initialized, the process goes to step S 12 .
- the mobile phone can not be used if the SIM card is changed. If the user want to change the SIM card, the effective ID of the user must be shown to the communication operators, and the communication operators makes the real-name card-issuing system to compare the user information with the effective ID. If the effective ID of the user corresponds with the user information, the mobile phone will be initialized, and then the user can change the SIM card.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims (13)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810305937 | 2008-12-03 | ||
CN200810305937.4 | 2008-12-03 | ||
CN2008103059374A CN101753683B (en) | 2008-12-03 | 2008-12-03 | Mobile phone antitheft system |
Publications (2)
Publication Number | Publication Date |
---|---|
US20100135492A1 US20100135492A1 (en) | 2010-06-03 |
US8343236B2 true US8343236B2 (en) | 2013-01-01 |
Family
ID=42222829
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/604,917 Expired - Fee Related US8343236B2 (en) | 2008-12-03 | 2009-10-23 | Anti-theft system and method for mobile phone |
Country Status (2)
Country | Link |
---|---|
US (1) | US8343236B2 (en) |
CN (1) | CN101753683B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10438467B2 (en) | 2016-06-21 | 2019-10-08 | Myongsu Choe | Portable object detection systems and methods for mutual monitoring based on cooperation in a network including devices with asymmetric and constrained power capacities |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8683196B2 (en) * | 2009-11-24 | 2014-03-25 | Red Hat, Inc. | Token renewal |
CN102469451B (en) * | 2010-11-16 | 2015-06-17 | 深圳市雄帝科技股份有限公司 | Method and system for phone card real-name authentication |
CN105447402A (en) | 2014-09-28 | 2016-03-30 | 酷派软件技术(深圳)有限公司 | Data processing method and data processing apparatus |
US11014191B2 (en) * | 2016-08-12 | 2021-05-25 | Baker Hughes, A Ge Company, Llc | Frequency modulation for magnetic pressure pulse tool |
CN107566640A (en) * | 2017-08-31 | 2018-01-09 | 希姆通信息技术(上海)有限公司 | The control method and mobile terminal of the sim card slot of mobile terminal |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5742910A (en) * | 1995-05-23 | 1998-04-21 | Mci Corporation | Teleadministration of subscriber ID modules |
US5933773A (en) * | 1996-05-13 | 1999-08-03 | Telefonaktiebolaget Lm Ericsson | Method and a device for mobile telephone supervision |
US6005942A (en) * | 1997-03-24 | 1999-12-21 | Visa International Service Association | System and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card |
US6223291B1 (en) * | 1999-03-26 | 2001-04-24 | Motorola, Inc. | Secure wireless electronic-commerce system with digital product certificates and digital license certificates |
US20060116169A1 (en) * | 2004-11-27 | 2006-06-01 | Lg Electronics Inc. | Apparatus and method for initialization of mobile communication terminal |
US20070011466A1 (en) * | 2005-07-05 | 2007-01-11 | Sony Ericsson Mobile Communications Japan, Inc. | Mobil terminal device, personal identification number verification program, and method of verifying personal identification number |
US7227952B2 (en) * | 2000-12-07 | 2007-06-05 | Sandisk Corporation | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media |
WO2007104923A1 (en) | 2006-03-16 | 2007-09-20 | British Telecommunications Public Limited Company | Methods, apparatuses and software for authentication of devices temporarily provided with a sim to store a challenge-response |
US20080173708A1 (en) * | 2004-07-01 | 2008-07-24 | American Express Travel Related Services Company, Inc. | Biometric safeguard method with a smartcard |
US20080285755A1 (en) * | 2005-04-21 | 2008-11-20 | Sylvie Camus | Method and Device for Accessing a Sim Card Housed in a Mobile Terminal |
US20090253410A1 (en) * | 2008-04-02 | 2009-10-08 | William Fitzgerald | Method for mitigating the unauthorized use of a device |
US20090273435A1 (en) * | 2008-05-02 | 2009-11-05 | Research In Motion Limited | Coordinated security systems and methods for an electronic device |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100362880C (en) * | 2003-11-21 | 2008-01-16 | 华为技术有限公司 | Identification method of mobile terminal user legalness |
CN101207919B (en) * | 2006-12-18 | 2012-05-23 | 松下电器产业株式会社 | Safety method of network telephone communication and apparatus thereof |
-
2008
- 2008-12-03 CN CN2008103059374A patent/CN101753683B/en not_active Expired - Fee Related
-
2009
- 2009-10-23 US US12/604,917 patent/US8343236B2/en not_active Expired - Fee Related
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5742910A (en) * | 1995-05-23 | 1998-04-21 | Mci Corporation | Teleadministration of subscriber ID modules |
US5933773A (en) * | 1996-05-13 | 1999-08-03 | Telefonaktiebolaget Lm Ericsson | Method and a device for mobile telephone supervision |
US6005942A (en) * | 1997-03-24 | 1999-12-21 | Visa International Service Association | System and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card |
US6223291B1 (en) * | 1999-03-26 | 2001-04-24 | Motorola, Inc. | Secure wireless electronic-commerce system with digital product certificates and digital license certificates |
US7227952B2 (en) * | 2000-12-07 | 2007-06-05 | Sandisk Corporation | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media |
US20080173708A1 (en) * | 2004-07-01 | 2008-07-24 | American Express Travel Related Services Company, Inc. | Biometric safeguard method with a smartcard |
US20060116169A1 (en) * | 2004-11-27 | 2006-06-01 | Lg Electronics Inc. | Apparatus and method for initialization of mobile communication terminal |
US20080285755A1 (en) * | 2005-04-21 | 2008-11-20 | Sylvie Camus | Method and Device for Accessing a Sim Card Housed in a Mobile Terminal |
US20070011466A1 (en) * | 2005-07-05 | 2007-01-11 | Sony Ericsson Mobile Communications Japan, Inc. | Mobil terminal device, personal identification number verification program, and method of verifying personal identification number |
WO2007104923A1 (en) | 2006-03-16 | 2007-09-20 | British Telecommunications Public Limited Company | Methods, apparatuses and software for authentication of devices temporarily provided with a sim to store a challenge-response |
US20090011739A1 (en) * | 2006-03-16 | 2009-01-08 | Piotr L Cofta | Methods, apparatuses and software for authentication of devices temporarily provided with a sim to store a challenge-response |
US20090253410A1 (en) * | 2008-04-02 | 2009-10-08 | William Fitzgerald | Method for mitigating the unauthorized use of a device |
US20090273435A1 (en) * | 2008-05-02 | 2009-11-05 | Research In Motion Limited | Coordinated security systems and methods for an electronic device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10438467B2 (en) | 2016-06-21 | 2019-10-08 | Myongsu Choe | Portable object detection systems and methods for mutual monitoring based on cooperation in a network including devices with asymmetric and constrained power capacities |
Also Published As
Publication number | Publication date |
---|---|
CN101753683B (en) | 2013-09-04 |
CN101753683A (en) | 2010-06-23 |
US20100135492A1 (en) | 2010-06-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8343236B2 (en) | Anti-theft system and method for mobile phone | |
CN102460451B (en) | Method and apparatus for preventing unauthorized use of computing devices | |
US8380259B2 (en) | Wirelessly accessing broadband services using intelligent covers | |
EP1455499B1 (en) | Security element commanding method and mobile terminal | |
US20100207723A1 (en) | Electrically locking device and electric lock system and unlocking method thereof | |
CN109478352A (en) | Method and apparatus for configuring multiple access control apparatus in installation site | |
CN105915714A (en) | Method and device for prompting terminal loss | |
CN101667255B (en) | Security authentication method, device and system for radio frequency identification | |
JP2007281861A (en) | Terminal authentication method and mobile terminal device | |
JP2011151487A (en) | Terminal-line opening system, and terminal-line opening method | |
US20200391695A1 (en) | Electronic device for managing application relating to key of external electronic device, and operating method of electronic device | |
CN107070663B (en) | Mobile terminal-based field authentication method and field authentication system | |
EP3926992B1 (en) | Electronic device, and authentication method in electronic device | |
US20120190340A1 (en) | Method for binding secure device to a wireless phone | |
CN110770730B (en) | Electronic device unlocking method, electronic device, storage medium and program product | |
WO2018201738A1 (en) | Method for locking mobile terminal, mobile terminal and computer-readable storage medium | |
JP2008293251A (en) | Portable terminal, and authentication method and program in portable terminal | |
TWI566571B (en) | Method of performing sim/usim personalization on mobile devices | |
CN100518370C (en) | Authentication of mobile station | |
KR102582768B1 (en) | Method for Providing Service by using Reverse Direction Certification | |
KR101505734B1 (en) | Method for Authenticating Near Field Communication Card by using Time Verification | |
JP2018041216A (en) | Authentication system and authentication method | |
JP4190023B1 (en) | Authentication apparatus, method, and computer program | |
JP2024013677A (en) | Apparatus connection system, mobile terminal, and computer program | |
US20210097162A1 (en) | Method and apparatus for unlocking a screen and mobile electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SHENZHEN FUTAIHONG PRECISION INDUSTRY CO., LTD.,CH Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:JIA, LI-JIN;REEL/FRAME:023416/0401 Effective date: 20090730 Owner name: FIH (HONG KONG) LIMITED,HONG KONG Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:JIA, LI-JIN;REEL/FRAME:023416/0401 Effective date: 20090730 Owner name: FIH (HONG KONG) LIMITED, HONG KONG Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:JIA, LI-JIN;REEL/FRAME:023416/0401 Effective date: 20090730 Owner name: SHENZHEN FUTAIHONG PRECISION INDUSTRY CO., LTD., C Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:JIA, LI-JIN;REEL/FRAME:023416/0401 Effective date: 20090730 |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20170101 |